Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 | 0:3.4.1-2.el10 ~ * | cpe:/o:redhat:enterprise_linux:10.0 | |
| Red Hat | Red Hat Enterprise Linux 6 | - | cpe:/o:redhat:enterprise_linux:6 | |
| Red Hat | Red Hat Enterprise Linux 7 | - | cpe:/o:redhat:enterprise_linux:7 | |
| Red Hat | Red Hat Enterprise Linux 8 | - | cpe:/o:redhat:enterprise_linux:8 | |
| Red Hat | Red Hat Enterprise Linux 9 | - | cpe:/o:redhat:enterprise_linux:9 | |
| Red Hat | Red Hat OpenShift Container Platform 4 | - | cpe:/a:redhat:openshift:4 |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/themirze/cve-2024-12084 | POC Details |
| 2 | A heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes), an attacker can write out of bounds in the sum2 buffer. | https://github.com/rxerium/CVE-2024-12084 | POC Details |
| 3 | heap overflow allowing execution of arbitrary commands | https://github.com/0xSigSegv0x00/cve-2024-12084 | POC Details |
| 4 | heap overflow allowing execution of arbitrary commands | https://github.com/fatcatresearch/cve-2024-12084 | POC Details |
| 5 | A easy poc for CVE-2024-12084. | https://github.com/InkeyP/CVE-2024-12084 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet